Access Control
*
Introduction:Physical security breaches can be detrimental to any company. Adequate access control is imperative to insure the protection of data, assets and employees. In a post 9/11 America, the need for higher physical security standards and more stringent access control systems remains a critical piece of corporate security plans. Access control systems not only keep out unauthorized individuals, but prevent unauthorized access to data and equipment, and help deter and prevent unauthorized disclosure of information. “In traditional physical security, locks, security alarms, access controls, and surveillance video define the primary hardware systems.” (Martin & Bakhto). This paper examines the significance of physical access controls and their purpose and place in the corporate security program. Risks and Threats Overview:

There are many risks and threats associated with corporations and the protection of their assets and data. Some of these threats include, terrorism (both domestic and foreign), cyber threats, armed intruders, espionage, bomb threats and data spills. Any one of these threats, if allowed to become a reality, could easily be the downfall of a corporation, depending on the severity of the threat. “Physical security breaches can result in more issues for an organization than a worm attack. Loss of data, temporary loss of availability by shutting systems down, or longer term loss of availability by bomb or arson are all things to consider when implementing physical security.” (Giannoulis & Northcutt, 2007)

The safety and security of a corporation’s employees is imperative for proper function, success, and productivity. Corporations have a duty to make sure all measures are taken to ensure the safety of the employees, whether it’s protection from outside intruders, or safeguarding from information spills or data breaches. Risks Associated with Access Control:

In 2012, there was at least one armed intruder incident per month in the United States. This includes disgruntled employees seeking revenge, protestors, mentally ill family members seeking vengeance, and random acts of violence. Armed intruders have become, unfortunately, an all too common occurrence in the United States. Corporations have started incorporating armed intruder training into their corporate security plans, to make sure employees are aware of what to do in the event they are involved in a workplace violence incident. Internal and external thefts are two of the biggest threats to a company’s security. Statistics show that a company is more likely to have data or assets stolen by an internal employee rather than someone from the outside. Thefts can occur both physically and logically, meaning the property stolen can be equipment or information. Since many companies depend on proprietary information to conduct business, the unauthorized disclosure of that information could prove detrimental to a company’s bottom line. Corporate espionage has existed since companies have existed. Over the years, many people have been caught revealing government secrets or disclosing proprietary information to competing companies in return for financial gain. These spies use many methods to gain access to the information they wish to sell and many of these methods are new technologies that have just...

YOU MAY ALSO FIND THESE DOCUMENTS HELPFUL

...BUILDING AN ACCESSCONTROL SYSTEM
SHEENA TAYLOR
PROFESSOR HOSKINS
CIS210
SUNDAY, JULY 22, 2012
PROJECT OBJECTIVE
As a colleague of the Information Security team at a small college, you have been made the project manager to install an accesscontrol system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security...

...Project: AccessControl Proposal
IS3230 - AccessControl
Bernard Downing
David Crenshaw
/2014
1 INTRODUCTION
1.1 Title of the project
AccessControl Proposal Project for IDI
1.2 Project schedule summary
The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.
1.3 Project deliverables
• Solutions to the issues that specifies...

...﻿
A New Way to Open Doors
Table of Contents
Table of Contents 2
Appendix 8
Abstract
Due to recent university campus violence it has become necessary for the before mention organization to develop a accesscontrol systems (ACS) to ensure student safety. As a member the security team I‘m the project manager project manager for the ACS .This essay will look at the five phases and applicable subsets in the building of the ACS for resident...

...﻿
Unit 10 Assignment 1:
Controls
IS 4560
Hacking and Countermeasures
Thursday, December 19, 2013
Unit 10 Assignment 1: Controls
Aim Higher College needs to ensure the safety of all its information. Recently we have seen suspicious and careless activity in the research data center. Data center technicians have reported lights left on, doors left open, successful logins to the research database, as well as login attempts in the backup...

...Administrative Control Paper
Name
Practices for Administration of Physical & Operations Security
SE578ON_L
Professor:
January 13, 2012
Administrative Control Paper
How do Administrative Controls demonstrate "Due Care?
To better answer this question lets define “Administrative Controls” and “Due Care.” Administrative Controls can be the defined as direction or exercise of authority over subordinate or other...

...Doshi
Unit 4222-226 Gain access to the homes of individuals, deal with emergencies and ensure security on departure.
1
1.1
Entry and departure to the client’s homes would have been agreed at the initial assessment. This information would have been included in the red folder which is left on the premises. If installed the keysafe code would have also been disclosed along with the agreed times of entering and departing and who to contact if no answer.
If obtaining...